Computer Program Product and Computer System for Controlling Performance of Operations within a Data Processing System or Networks
0 Assignments
0 Petitions
Accused Products
Abstract
Provided are methods, apparatus and computer programs for identifying matching resources (data files and executable files) within a data processing network, by comparison of hash values computed for each of a set of resources. A match between a newly computed hash value and a previously computed hash value for a resource indicates that the resource has not changed since the previous computation. A match between hash values for different resources indicates that they are identical. The result of the comparison can be used to determine whether a virus scan is currently required for a resource, on the basis that a resource which is unchanged since it was classified virus-free remains virus-free and a resource which is identical to a virus-scanned resource does not require duplication of the virus scan. The methods, apparatus and computer programs enable more efficient use of antivirus scanning or management of a backup copy process.
-
Citations
63 Claims
-
1-38. -38. (canceled)
-
39. A computer program product, stored on a tangible, computer readable medium, for controlling performance of operations in relation to a set of resources within a data processing network, the operations including a first operation, said computer program product having instructions for execution by a computer, which, when executed by the computer, cause the computer to implement a method comprising the steps of:
-
computing a set of hash values representing a set of resources for which an operation has been performed; storing the set of hash values; in response to a requirement for performance of the operation, computing a new set of hash values representing the set of resources; comparing the new hash values with the stored hash values for the set of resources to identify matches between new hash values and stored hash values; determining that performance of the operation is not currently required for resources for which a match is identified between the respective new hash value and a stored hash value; performing the operation for resources for which no match is identified between the new hash value and any stored hash value; wherein the step of computing a new set of hash values comprises; reading the set of resources from a first storage medium of a system in the data processing network into a second storage medium of the system, the second storage medium providing faster access than the first storage medium, wherein the computing of the new set of hash values accesses the set of resources read to the second storage medium and the method further comprises; comparing each resource of the set of resources with a maximum size limit to identify a subset of the resources, wherein each resource of the subset is smaller than said size limit; and retaining said subset of resources within said second storage medium and performing, for the subset of resources retained within said second storage medium, further operations on ones of the subset of resources, the further operations being selected from operations including; making backup copies and transferring copies of the resources of the subset of resources to other systems. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A computer system, comprising:
-
a processor; and a storage device connected to the processor, wherein the storage device has stored thereon a program for causing the processor to perform operations in relation to a set of resources within a data processing network, the operations including a first operation, and wherein the processor is operative to execute instructions of the program to implement a method comprising the steps of; computing a set of hash values representing a set of resources for which an operation has been performed; storing the set of hash values; in response to a requirement for performance of the operation, computing a new set of hash values representing the set of resources; comparing the new hash values with the stored hash values for the set of resources to identify matches between new hash values and stored hash values; determining that performance of the operation is not currently required for resources for which a match is identified between the respective new hash value and a stored hash value; performing the operation for resources for which no match is identified between the new hash value and any stored hash value; wherein the step of computing a new set of hash values comprises; reading the set of resources from a first storage medium of a system in the data processing network into a second storage medium of the system, the second storage medium providing faster access than the first storage medium, wherein the computing of the new set of hash values accesses the set of resources read to the second storage medium and the method further comprises; comparing each resource of the set of resources with a maximum size limit to identify a subset of the resources, wherein each resource of the subset is smaller than said size limit; and retaining said subset of resources within said second storage medium and performing, for the subset of resources retained within said second storage medium, further operations on ones of the subset of resources, the further operations being selected from operations including; making backup copies and transferring copies of the resources of the subset of resources to other systems. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63)
-
Specification